Using Program Analysis to Synthesize Sensor Spoofing Attacks.
Ivan PustogarovThomas RistenpartVitaly ShmatikovPublished in: AsiaCCS (2017)
Keyphrases
- sensor networks
- intrusion detection and prevention
- ddos attacks
- sensor data
- countermeasures
- identity theft
- real time
- multi sensor
- watermarking scheme
- malicious attacks
- denial of service attacks
- data acquisition
- neural network
- terrorist attacks
- computer security
- personal information
- security protocols
- data streams
- cryptographic protocols
- traffic analysis
- image sensor
- video camera
- digital images